General

  • Target

    a143da5889aa739a18399bf2d4fe6352191eaa06ed7ef2568dfd57983eaa416a.exe

  • Size

    672KB

  • Sample

    240522-r9c9nafa81

  • MD5

    1d8c5978c488b34fbbdd7e4f3d004e05

  • SHA1

    78012b122c2005c14fc47074d6dff0b5576bef9d

  • SHA256

    a143da5889aa739a18399bf2d4fe6352191eaa06ed7ef2568dfd57983eaa416a

  • SHA512

    5a319bdb918bf714e88e19527e1aa7f06eb06a3f66938b69e20a338df440cc0fae5f92f4dc2224dd3ddba403f81a5ab58362abe63fa1c6b4e38ec51ab568399e

  • SSDEEP

    12288:urEAmDBPc3B4dcSlcEko2nsCj0CNDtJUy+QzKqWxGf3eb6O0JnWie:krSlcTs+0MULQzKu31zZQ

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      a143da5889aa739a18399bf2d4fe6352191eaa06ed7ef2568dfd57983eaa416a.exe

    • Size

      672KB

    • MD5

      1d8c5978c488b34fbbdd7e4f3d004e05

    • SHA1

      78012b122c2005c14fc47074d6dff0b5576bef9d

    • SHA256

      a143da5889aa739a18399bf2d4fe6352191eaa06ed7ef2568dfd57983eaa416a

    • SHA512

      5a319bdb918bf714e88e19527e1aa7f06eb06a3f66938b69e20a338df440cc0fae5f92f4dc2224dd3ddba403f81a5ab58362abe63fa1c6b4e38ec51ab568399e

    • SSDEEP

      12288:urEAmDBPc3B4dcSlcEko2nsCj0CNDtJUy+QzKqWxGf3eb6O0JnWie:krSlcTs+0MULQzKu31zZQ

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks